Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2024

H1 2024 Platform Vision, Roadmap, and Review

Many organizations struggle with handling BYOD and mobile devices. Permitting those devices to access resources poses a larger challenge for governance, risk, and compliance (GRC). Questions of how to deploy approved apps and updates remain unresolved. It’s an even greater struggle when legacy Active Directory infrastructure is added to the mix. The temptation to piece together a strategy with point solutions can be met with resistance from IT directors who favor consolidation.

How To Prevent Scammers From Accessing Your Email

Your email is a goldmine for cybercriminals because of the extensive amount of information an attacker can gain from it, making it important to protect your email from unauthorized access. To prevent scammers from accessing your email, you should use a passkey to log in (if available), enable MFA and have an email recovery option set up. Continue reading to learn the importance of protecting your email and the steps you should be taking to protect your email account.

Protecto Unveils Enhanced Capabilities to Enable HIPAA-Compliant Data for Generative AI Applications in Snowflake

San Francisco, CA - Protecto, a leading innovator in data privacy and security solutions, is proud to announce the release of new capabilities designed to identify and cleanse Protected Health Information (PHI) data from structured and unstructured datasets, facilitating the creation of safe and compliant data for Generative AI (GenAI) applications. This advancement underscores Protecto's commitment to data security and compliance while empowering organizations to harness the full potential of GenAI.

Cyber Exterminators: Monitoring the Shop Floor with OT Security

Pressure is increasing on manufacturers to monitor their shop floors for malicious activity to avoid creating major disruptions in the supply chain. One key security defensive tool for monitoring network-connected devices in a manufacturing environment is Operational Technology Security or just OT. Let’s look at what OT is and how it can detect malicious activity.

911 S5 Botnet Operation Disruption Highlights the Need for MDR and Email Security

A major botnet operation that controlled an estimated 19 million IP addresses and was responsible for $99 million in illegal gains was shut down this week, and an international law enforcement operation arrested its primary operator. Botnet operations may not be as top of mind as ransomware, but these attacks are still responsible for millions in losses and pose a massive threat to businesses and consumers.

Check Point Vulnerability: CVE-2024-24919

On May 28, 2024, Check Point released an advisory for CVE-2024-24919, a high priority bug which according to NIST NVD is categorized as “Exposure of Sensitive Information to an Unauthorized Actor”. The NVD has yet to assess a CVSS score for CVE-2024-24919 as of this writing. This vulnerability affects Check Point Security Gateway devices connected to the internet and configured with either IP-Sec VPN or Mobile Access software blades.

UiPath CyberArk CCP Integration Conjur Cloud

Welcome to our latest video where we dive into the world of Conjur Cloud! Conjur Cloud is a cutting-edge SaaS-based, cloud-agnostic solution designed specifically for secrets management. It offers organizations a robust platform to secure non-human access to secrets, eliminating the notorious "secret zero" problem once and for all.

Motific's Policies Feature

This video dives into how Motific policies work. See it in action with a marketing use case that we implemented as an Off-Topic Detection policy to filter specific words. This policy successfully blocks irrelevant queries before they reach the underlying LLM. Users who try off-topic queries will see an error message, guiding them to align with organizational policies and resubmit their request.

Motific's Intelligence Feature

Motific's intelligence feature dives deep into Motif activity, offering valuable business insights. You'll see details on prompt usage, time saved, and performance metrics for each Motif. The Time Savings dashboard showcases efficiency gains compared to manual document creation, while task usage and optimization metrics provide even more insights into a Motif's effectiveness.